{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:27:23Z","timestamp":1771043243060,"version":"3.50.1"},"reference-count":107,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tnsm.2024.3517621","type":"journal-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:25:03Z","timestamp":1734377103000},"page":"1972-1999","source":"Crossref","is-referenced-by-count":3,"title":["Cyber Attacks Prevention Toward Prosumer-Based EV Charging Stations: An Edge-Assisted Federated Prototype Knowledge Distillation Approach"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4441-4390","authenticated-orcid":false,"given":"Luyao","family":"Zou","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Kyung Hee University, Yongin, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3758-0902","authenticated-orcid":false,"given":"Quang","family":"Hieu Vo","sequence":"additional","affiliation":[{"name":"Samsung Electric, Suwon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5692-1189","authenticated-orcid":false,"given":"Kitae","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Kyung Hee University, Yongin, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8342-7614","authenticated-orcid":false,"given":"Huy Q.","family":"Le","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Kyung Hee University, Yongin, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5708-6971","authenticated-orcid":false,"given":"Chu","family":"Myaet Thwal","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Kyung Hee University, Yongin, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6007-6099","authenticated-orcid":false,"given":"Chaoning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, School of Computing, Kyung Hee University, Yongin, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3484-7333","authenticated-orcid":false,"given":"Choong","family":"Seon Hong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Kyung Hee University, Yongin, Gyeonggi, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3160210"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3203707"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TTE.2020.2986675"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN56518.2023.10048987"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500822"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.03.025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2017.8378347"},{"key":"ref8","first-page":"289","article-title":"A multiple cloud-aided federated learning-based security module towards EVCS energy management system","volume-title":"Proc. Korea Softw. Congr.","author":"Zou"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3218843"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013587"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500877"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3040887"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108727"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118573"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00145"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s23146518"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20819"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/a16020075"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12041044"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SPIES48661.2020.9243152"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA48937.2020.9248225"},{"key":"ref23","first-page":"14","article-title":"Utilising VAPT technologies (vulnerability assessment & penetration testing) as a method for actively preventing cyberattacks","volume":"12","author":"Vegesna","year":"2022","journal-title":"Int. J. Manage. Technol. Eng."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2022.3224597"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3225185"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN56518.2023.10049011"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-29763-x"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3586102.3586107"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838256"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622262"},{"key":"ref31","first-page":"30","article-title":"EFCKD: edge-assisted federated contrastive knowledge distillation approach for energy management: Energy theft perspective","volume-title":"Proc. 24st Asia-Pacific Netw. Oper. Manage. Symp. (APNOMS)","author":"Zou"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3275438"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3313001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP49359.2023.10222143"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3313118"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.05.076"},{"key":"ref37","volume-title":"NSL-KDD dataset","year":"2023"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2715166"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"ref44","first-page":"1","article-title":"A lightweight method for tackling unknown participation statistics in federated averaging","volume-title":"Proc. ICLR","author":"Wang"},{"key":"ref45","first-page":"1","article-title":"FedExP: Speeding up federated averaging via extrapolation","volume-title":"Proc. ICLR","author":"Jhunjhunwala"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.061308"},{"key":"ref47","first-page":"1","article-title":"A snapshot of the frontiers of client selection in federated learning","volume-title":"Proc. Trans. Mach. Learn. Res.","author":"N\u00e9meth"},{"key":"ref48","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Stat.","author":"McMahan"},{"key":"ref49","first-page":"16937","article-title":"Inverting Gradients\u2014How easy is it to break privacy in federated learning?","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Geiping"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3238354"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3055564"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00511"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9860009"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3446636"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3160266"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.12.059"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.07.036"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/app12031520"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00489"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.04.127"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.05.018"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3201569"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00041"},{"key":"ref65","first-page":"1","article-title":"Uses and abuses of the cross-entropy loss: Case studies in modern deep learning","volume-title":"Proc. \u2019I Can\u2019t Believe It\u2019s Not Better!\u2019 NeurIPS Workshops","volume":"137","author":"Gordon-Rodriguez"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-019-2813-6"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3073925"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2021.3096286"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299173"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i13.29365"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.14778\/3617838.3617842"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796865"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2024.3351960"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996309"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3269062"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20859"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054698"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3293882"},{"key":"ref79","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst. (MLSys)","author":"Li"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3315066"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.190"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.108774"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3442442.3452055"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2021.12.056"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028690"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3365495"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SMC42975.2020.9283220"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.3390\/app122312336"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/iceca55336.2022.10009130"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9525002"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.health.2022.100107"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.3390\/a15070247"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.3390\/s16111947"},{"key":"ref95","first-page":"9","article-title":"Reducing false alarms in intrusion detection systems\u2014A survey","volume":"5","author":"Sardana","year":"2018","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ASICON47005.2019.8983598"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2017.7881684"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC50486.2020.9318212"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3224539"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3229005"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163027"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3432610"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet50428.2020.9265461"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868171"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3185327"},{"key":"ref106","volume-title":"Smart grid stability","year":"2024"},{"key":"ref107","volume-title":"Theft detection in smart grid environment","author":"Zidi","year":"2022"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10973774\/10803006.pdf?arnumber=10803006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T17:56:29Z","timestamp":1745430989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10803006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":107,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3517621","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}